CN101714203A - File transparent encryption method for marker file and data file - Google Patents
File transparent encryption method for marker file and data file Download PDFInfo
- Publication number
- CN101714203A CN101714203A CN200910188877A CN200910188877A CN101714203A CN 101714203 A CN101714203 A CN 101714203A CN 200910188877 A CN200910188877 A CN 200910188877A CN 200910188877 A CN200910188877 A CN 200910188877A CN 101714203 A CN101714203 A CN 101714203A
- Authority
- CN
- China
- Prior art keywords
- file
- data
- disk
- encrypted
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a file transparent encryption method for a marker file and a data file. The technical scheme comprises the following steps of: (1) setting that all files in one storage position are encrypted; (2) one encrypted marker file exists in a directory in which each encrypted file is, showing that the file is encrypted; (3) when a kernel module intercepts the 'read' action, deciphering the data of a disk; and (4) when the kernel module intercepts the 'write' action, encrypting the data of the disk.
Description
Technical field
The file transparent encryption method that adopts tab file and data file to combine is applied to the file data field of encryption, can be used for being encrypted in the file on local hard drive and the mobile memory medium.
Technical background
File encryption becomes an indispensable ingredient of information security just day by day.The WINDOWS system the NTFS system built-in EFS file encryption function.But there is a defective in this encryption function, must use NTFS.If the storage medium in user's the system uses the file system of non-NTFS, then can't support.
The file encryption solution that some application layers realize then exists the problem that each application program is all needed to be special HOOK.And the read-write of some mode can't be supported.
Have now some other transparent encryption solution, but aspect of performance not very satisfactory.
Summary of the invention
Consider existing technical defective, the invention provides one and support various file system, high performance file transparent encryption method.
Concrete step is as follows:
1) with encryption key and need information encrypted to be saved in configuration file;
2) in system start-up, filter Driver on FSD reads key and needs to encrypt from configuration file memory location;
3) after the normal operation of system, the normal instrument that uses oneself of user;
4) intercept application program new files when action in this memory location at kernel module, in the file of setting up one 0 byte, set up a tab file;
5) when kernel module is intercepted application program and is opened file in this memory location, if not then a newly-built tab file, and with original file encryption;
6) when kernel module is intercepted application program and is read file, with the data decryption of reading in the disk;
7) when kernel module is intercepted the application program written document, the data encryption of disk will be write.
Description of drawings
Fig. 1 encryption system initialization flowchart
The normal operational flow diagram of Fig. 2 encryption system
Embodiment
The present invention is applicable to any OS (Operating System) and any file system.But current is being that example is described implementation step with WINDOWSXP only.
In the time of concrete enforcement, need a WINDOWS XP system, the configurator of key and encrypted location, a filter Driver on FSD.Step is as follows:
At first with drive installation on system;
Then key and encrypted location are configured in the registration table;
Restart system;
Filter Driver on FSD loads the configuration information of key and encrypted location;
System normally starts;
Normal oneself application software commonly used of using of user;
The filter Driver on FSD module is tackled user's operation automatically, and does corresponding processing.
Claims (3)
1. the file transparent encryption method that adopts tab file and data file to combine, its feature is as follows:
Two files, one is the ciphered data file, another is the encrypted indicia file;
When opening for the first time, set up tab file, and with file encryption;
During new files, set up tab file;
When opening later on, just can determine according to tab file whether this file is encrypted;
To write the data encryption of disk, will read the data decryption of disk.
2. the feature of two files is as follows:
One is ciphered data file, and one is the encrypted indicia file;
The user can see data file, and encrypt file is hidden.
3. with data encryption, will read the data decryption of disk, be characterised in that:
The data encryption of disk will be write;
The data decryption of disk will be read;
Other IO are without any need for special processing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910188877A CN101714203A (en) | 2009-12-16 | 2009-12-16 | File transparent encryption method for marker file and data file |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910188877A CN101714203A (en) | 2009-12-16 | 2009-12-16 | File transparent encryption method for marker file and data file |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101714203A true CN101714203A (en) | 2010-05-26 |
Family
ID=42417844
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200910188877A Pending CN101714203A (en) | 2009-12-16 | 2009-12-16 | File transparent encryption method for marker file and data file |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101714203A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111125742A (en) * | 2018-10-30 | 2020-05-08 | 奇酷互联网络科技(深圳)有限公司 | File management method, intelligent terminal and device with storage function |
-
2009
- 2009-12-16 CN CN200910188877A patent/CN101714203A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111125742A (en) * | 2018-10-30 | 2020-05-08 | 奇酷互联网络科技(深圳)有限公司 | File management method, intelligent terminal and device with storage function |
CN111125742B (en) * | 2018-10-30 | 2024-04-05 | 奇酷互联网络科技(深圳)有限公司 | File management method, intelligent terminal and device with storage function |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9866374B2 (en) | Computer programs, secret management methods and systems | |
US20060190722A1 (en) | Reading at least one locked, encrypted or locked, unencrypted computer file | |
US20090164709A1 (en) | Secure storage devices and methods of managing secure storage devices | |
CN112269547B (en) | Active and controllable hard disk data deleting method and device without operating system | |
WO2011041128A2 (en) | Authentication and securing of write-once, read-many (worm) memory devices | |
CN103617399A (en) | Data file protecting method and device | |
US7577809B2 (en) | Content control systems and methods | |
JPWO2014167721A1 (en) | Data erasing device, data erasing method, program, and storage medium | |
CN107729777A (en) | A kind of safety encryption solid-state storage method | |
WO2012094969A1 (en) | Data protection method and apparatus | |
WO2007091652A1 (en) | Tally information management method and management device | |
CN101021793B (en) | Method and system for realizing Pre-OS Application utilizing extended BIOS technique | |
JP4516598B2 (en) | How to control document copying | |
JP2007148466A (en) | Portable storage device and os | |
JP4767619B2 (en) | External storage device and SBC control method | |
Huber et al. | A flexible framework for mobile device forensics based on cold boot attacks | |
CN110673863B (en) | Intelligent lock system supporting pluggable external storage and intelligent upgrading method | |
CN110826099A (en) | Safe storage method and system suitable for embedded real-time operating system | |
CN101714203A (en) | File transparent encryption method for marker file and data file | |
CN113302598B (en) | Electronic data management device, electronic data management system, and method used therefor | |
KR101629740B1 (en) | Apparatus and Method of Information Storage with Independent Operating System | |
KR20080088911A (en) | New data storage card, interface device and method by memory's bad pattern | |
CN105844151B (en) | File storage protection implementation method and system | |
CN112434285B (en) | File management method, device, electronic equipment and storage medium | |
JP5983939B2 (en) | Information processing apparatus and information processing program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20100526 |